Combining morphological analysis and Bayesian networks for strategic decision support

Size: px
Start display at page:

Download "Combining morphological analysis and Bayesian networks for strategic decision support"

Transcription

1 Volume 23 (2), pp ORiON ISSN X c 2007 Combining morphological analysis and Bayesian networks for strategic decision support A de Waal T Ritchey Received: 27 September 2006; Revised: 23 April 2007; Accepted: 24 April 2007 Abstract Morphological analysis (MA) and Bayesian networks (BN) are two closely related modelling methods, each of which has its advantages and disadvantages for strategic decision support modelling. MA is a method for defining, linking and evaluating problem spaces. BNs are graphical models which consist of a qualitative and quantitative part. The qualitative part is a cause-and-effect, or causal graph. The quantitative part depicts the strength of the causal relationships between variables. Combining MA and BN, as two phases in a modelling process, allows us to gain the benefits of both of these methods. The strength of MA lies in defining, linking and internally evaluating the parameters of problem spaces and BN modelling allows for the definition and quantification of causal relationships between variables. Short summaries of MA and BN are provided in this paper, followed by discussions how these two computer aided methods may be combined to better facilitate modelling procedures. A simple example is presented, concerning a recent application in the field of environmental decision support. Key words: Morphological analysis, Bayesian networks, strategic decision support. 1 Introduction Strategic decision support often involves developing scenarios and creating complex strategy models. This presents us with a number of difficult methodological problems. Firstly, many of the factors involved are non-quantifiable, since they contain strong socio-political dimensions and conscious self-reference among actors. Furthermore, the uncertainties inherent in such problem complexes are in principle irreducible and often cannot be described or delineated fully. This means that traditional quantitative methods, such as causal modelling and simulation, are relatively useless. Added to this, the creative process involved in such studies is often difficult to trace. One seldom has an adequate audit trail describing the iterative process from problem Corresponding author: Meraka Institute, CSIR, PO Box 395, Pretoria, 0001, South Africa, adewaal@csir.co.za. Ritchey Consulting, Pajalagatan 56, SE , Vllingby, Sweden. 105

2 106 A de Waal & T Ritchey formulation, through alternative generation to specific solutions or conclusions. Without some form of traceability, there is little possibility of scientific control over results, let alone reproducibility. There are, however, methods and techniques that provide structure and guidance for thinking systematically about complex strategic decisions. Employed properly, these result in dynamic, interactive inference ( what-if ) models that support complex decision making. Importantly, one of the implicit outcomes of such a modelling process is a shared set of concepts among experts, and a better understanding of the wider context. Although there is no concise, unanimously agreed upon general definition of a (scientific) model, we feel that the following criteria meet what most analysts and researchers would consider a minimal definition (Compare with Doty & Glick, 1994). A model must contain two or more constructs that can serve as variables, i.e. dimensions which can support a range of states or values. One must be able to establish relationships (causal, statistical, logical, etc.) between these states or values. These relationships must be falsifiable (if the model applies to the empirical world). Two corollaries to these criteria are: Inputs can be given, and outputs obtained. Hypotheses can be formulated. This is a very general definition of the concept of model which, we feel, suffices to illuminate the general modelling processes described below. Morphological Analysis (MA) and Bayesian networks (BN) are two closely related modelling methods that can be employed systematically for strategic decision support. Each has its advantages and disadvantages for modelling complex processes and systems. MA allows small groups of subject specialists to define, link and internally evaluate the parameters of complex problem spaces easily, thus creating a solution space and flexible inference model. However, MA cannot easily treat hierarchal structure and causal relationships. BN modelling allows for such causal and hierarchal relationships, but is more difficult to employ in the initial problem formulation phase of the modelling process. Combining MA and BN, as two phases in the modelling process, allows one to gain the benefits of both of these modelling methods. This paper contains a short presentation of Morphological Analysis and Bayesian networks as strategic decision support modelling methods. A case study involving the use of both these methods in sequence is also described. The study concerns the development of a prototype instrument to assess the environmental impact of different fire-fighting methods under different conditions.

3 Combining morphological analysis and Bayesian networks for strategic decision support Morphological analysis Morphological Analysis (MA) was developed by Zwicky (1967, 1969) the Swiss-American astrophysicist and aerospace scientist as a general method for structuring and investigating the total set of relationships contained in multi-dimensional, usually non-quantifiable, problem complexes. Zwicky applied this method to such diverse fields as astrophysics, the development of propulsive power plants and propellants, and the legal aspects of space travel and colonisation. He founded the Society for Morphological Research and enthusiastically advanced the morphological approach for some 40 years from the early 1930 s until his death in More recently, morphological analysis has been extended and applied by a number of analysts and researchers in the USA and Europe in the field of policy analysis and futures studies (Rhyne 1981, 1995a, 1995b; Coyle, 1995, 1996). In 1996, one of the authors (Ritchey) developed computer support for general morphological analysis. Since then, researchers at FOI (the Swedish National Defence Research Agency) have carried out some fifty projects employing this method (Ritchey 1997, 1998, 2002, 2003; Eriksson & Ritchey, 2002; Ritchey & Stenström, 2002; Stenström & Westrin, 2004). P 33 P 32 P 31 P P P P P P P P P P Figure 1: A 3-parameter Zwicky box containing 75 cells or configurations (Zwicky, 1969, p. 118). MA begins by identifying and defining the dimensions (which eventually become the variables) of the problem complex to be investigated. Thereafter, each variable is assigned a range of relevant values or conditions. A morphological box also fittingly known as a Zwicky box is constructed by setting the variables against each other in an n-dimensional matrix, essentially a variable space (see Figure 1). Each cell of the n- dimensional box contains one particular value or condition from each of the variables, and

4 108 A de Waal & T Ritchey thus marks out a particular state or configuration of the problem complex as a whole. For example, imagine a simple problem complex which we define as consisting of three variables let us say colour, texture and size. In order to conform to Figure 1, let us further define the first two variables as consisting of 5 discrete values or conditions each (e.g. colour = red, green, blue, yellow, brown and texture = smooth, rough, bumpy, patterned, slick) and the third consisting of 3 values (size = large, medium, small). We then have = 75 cells in the Zwicky box, each containing 3 conditions i.e. one from each variable (e.g. red, rough, large). The entire 3-dimensional matrix is, in Zwicky s terms, a morphological field containing all of the (formally) possible relationships involved. The point is to examine all of the configurations in the field, in order to establish which of them are possible, viable, practical, interesting, etc., and which are not. In doing this, we mark out in the field what might be called a solution space. The solution space of a Zwickian morphological field consists of the subset of configurations which satisfy some criteria. Naturally, if one is working with more than three variables which is certainly the case in any but the simplest of problems then they cannot be represented in 3-dimensional space. For this reason, MA employs an alternative method of representing the multiple variables of the problem complex, the so-called morphological field. The field below (Figure 2) represents the 75-configuration Zwicky-box in Figure 1. The marked configuration in Figure 2 corresponds to one cell in the Zwicky-box. Figure 2: selected. A three parameter morphological field containing 75 possible configurations, one Morphological models typically contain 8 10 variables and tens of thousands to millions of possible (formal) configurations, far too many to examine individually. Thus, one must be able to reduce the number of configurations in a field, so that only those that meet certain criteria remain. The main criterion is that a configuration is internally consistent, i.e. that is does not contain conditions that are mutually contradictory. In fact, there are usually many such contradictory pairs of conditions in a typical morphological field. To the extent that a particular pair of conditions is considered to be a contradiction, all those configurations containing this pair of conditions would also be internally inconsistent.

5 Combining morphological analysis and Bayesian networks for strategic decision support 109 Fields are reduced by comparing each condition of each variable with every other condition of every other variable, and asking the question: Can these two conditions coexist? This is done by doing a cross-consistency assessment (CCA) with the help of a cross-consistency matrix (Figure 3, below). This matrix sets each condition against every other condition, in a pair-wise manner. Each pair of conditions is then examined, and a judgement is made as to whether or to what extent the pair can coexist, i.e. represent a consistent relationship. Note that there is no reference here to causality, but only to internal consistency. Figure 3: Cross-consistency matrix for the 3-parameter Zwicky box. Fields containing hundreds of thousands of configurations can typically be reduced by 90 or even 99 percent by making judgements about pairs that do not coexist. This reduction leaves us with a manageable number of configurations (i.e. solutions) to examine and work with. The technique of using pair-wise consistency relationships between conditions, in order to weed out internally inconsistent configurations, is made possible by a principle of dimensionally reduction inherent in the morphological approach. While the number of configurations in a morphological field grows exponentially with each new parameter, the number of pair-wise relationships between conditions grows only as a quadratic polynomial. Naturally, practical limits may be reached even with quadratic growth. The point, however, is that a morphological field involving as many as formal configurations requires no more than a few hundred pair-wise evaluations in order to create a solution space. With computer support, an internally assessed morphological field becomes a flexible model, in which anything can be input and anything output. This means that if a variable condition is chosen as an input, then all conditions consistent to the input are highlighted as outputs so that a map of consistent conditions is visible. Figure 5 is an example of a map of consistent conditions. Such a morphological model or field can be turned into a laboratory with which one can designate single or multiple drivers, in order to examine outputs or solution alternatives. Because of the complexity of the process, and the many thousands of potential configurations mapped out in even relatively small morphological fields, MA is difficult to employ without computer support. For this reason, the Swedish Defence Research Agency (FOI) has developed Casper: Computer Aided Scenario and Problem Evaluation Routine, which supports the entire MA-process. Casper is a proprietary software package developed and owned by the Swedish Defence Research Agency.

6 110 A de Waal & T Ritchey MA goes through cycles of analysis and synthesis in a number of iterative steps. iterative steps are (Ritchey & Stenström, 2002): Analysis phase: Define the problem complex in terms of variables and variable conditions. Step 1: Identify the dimensions, parameters or variables, which best define the essential nature of the problem complex or scenario. One should work with no more than 6 7 variables at a time. Step 2: For each variable, define a range of relevant, discrete values or conditions, which the variable can express. The variable and variable-condition matrix is the morphological field, an n-dimensional coordinate system that implicitly contains an outcome space for the problem complex thus defined. Synthesis phase: Link variables and synthesise an outcome space. Step 3: Assess the internal consistency of all pairs of variable conditions, weeding out all inconsistent or contradictory pairs. It is usually at this point that one begins to understand what the variables and variable conditions actually represent, that they are often poorly defined and must be adjusted. Steps 1 and 2 may now be reviewed and one may begin to iterate between steps 1, 2 and 3 until step 3 begins to work smoothly. Step 4: Synthesise an internally consistent outcome space. (Casper does this by running through all of the possible formal solutions in the morphological field and reducing the field by restricting all outcomes containing internal contradictions. The surviving configurations represent the solution space of the given problem complex. Step 5: Iterate the process if necessary. Scrutinise the solution space and return to steps 1, 2 and 3 in order to adjust variables, alternatives and consistency measures. Run steps 4 and 5 again. At this point, one has created a non-quantified if-then laboratory within which one can define drivers, assume certain conditions, and find the range of associated solutions. The strength of morphological analysis lies in its focus on problem formulation, parameterisation and the establishment of an internal structure all achieved through iterative cycles of analysis and synthesis, in a systematic and traceable manner. However, MA is weak in treating hierarchical structure, and does not establish causal relations between its constructs. For this, other modelling methods are required. The 3 Bayesian Networks 3.1 Causal Networks and d-separation One way to establish causal relationships and hierarchical structure between variables is to create a causal network of the problem complex. A causal network consists of nodes (variables) and arcs (directed links) between them, and mathematically it is called a directed graph. The relations between variables in a causal graph are explained by means of family relations: a link from A to B means that B is a child of A and A is a parent of B (Jensen, 2001).

7 Combining morphological analysis and Bayesian networks for strategic decision support 111 As with the MA technique, variables represent a set of conditions or states. In the real world, a variable is in exactly one of its states; however, the identity of the state may be unknown to us (Jensen, 2001). The purpose of the causal network is to understand how a change of states in one variable affects the certainty of states in other variables. d-separation is a property that describes the flow of information in a causal network, given that the state of a variable or set of variables is known. The nodes X and Y are d- separated if the set Z is observed and because of that observation, no information can flow between X and Y. d-separation is reflected in the concept of conditional independence. The variables A and C are independent given the variable B if P (a i b j ) = P (a i b j, c k ) for all i, j, k (Jensen, 2001). A B C D Figure 4: Simple Bayesian network 3.2 Definition of Bayesian Networks Let U = (X 1,..., X n ) be a set of variables that describes a problem complex. Then a Bayesian network is a causal network representing the joint probability table P (U) so that P (U) = P (X i parents(x i )), i where parents(x i ) is the set of parents of X i. This is the chain rule for a BN (Jensen, 2001). This concise representation of the joint probability P (U) is made possible because of the d-separation property of directed graphs. Jensen (2001) gives the following definition of a BN. A Bayesian network consists of the following: A set of variables and a set of directed edges between the variables. Each variable has a finite set of mutually exclusive states. The variables together with the directed edges form a directed acyclic graph (DAG) To each variable A with parents B 1,..., B n there is attached the potential table P (A B 1,..., B n ). The definition of a BN does not refer to causality. It is rather the d-separation properties induced by the causal networks that is required to prove the chain rule for BNs (Jensen,

8 112 A de Waal & T Ritchey 2001). This definition also describes the process of developing a BN, if each line in the definition is treated as a step in the development process. The potential table mentioned in line 4 of the definition describes the strength of relations between variables. This is achieved by means of probability calculus and the practical implementation is a conditional probability table (CPT) for each variable in the BN. Every variable is defined by the states (or conditions) that it takes on. States may be anything from sequential intervals to descriptions such as yes or no. The states of a variable must be mutually exclusive and exhaustive. An example of the CPT for variable C in the BN in Figure 4 is illustrated in Table 1. Note that the columns sum to one. b 1 b 2 b 3 c c Table 1: An example of P(C B) for the variable C in Figure 4. There are several potential sources for the probabilities of a BN. They include empirical data, literature and expert knowledge. Since the BN makes use of conditional probabilities, Bayes rule for the calculation of conditional probabilities may be used. Mathematically, Bayes rule states that P (X = x e) = P (e X = x)p (X = x), (1) P (e) where P (X = x e) denotes the probability that the random variable X has value x given evidence e (Jensen, 2001). The denominator on the right hand side of the equation is a normalising constant. Once the BN is constructed, it is used to estimate the values of query nodes, given the values of observed nodes (Murphy, 2002). This process is called inference and a BN can perform two inference tasks. One is to perform top-down reasoning where root nodes are observed and we predict the effects (Murphy, 2002) (option (a) in Table 1). The other way is to perform bottom-up reasoning where leaf nodes are observed and we infer the causes (Murphy, 2002) (option (b) in Table 1). The second task is the more interesting one as it reasons in the opposite direction of the constructed arcs in the network. Figures provide inference examples of a Bayesian network. From a knowledge engineering perspective, a graphical model serves as a communication tool to capture knowledge of the domain. The construction of the graphical model can serve as a facilitation method for interpersonal communication. Humans can communicate sensibly about causal relations and the model helps to focus their attention. Secondly, the graphical model can communicate to a computer the knowledge captured during the interpersonal model building exercise. The computer should be able to process the model and perform what-if analyses (Jensen, 2001). To sum up, when constructing a BN model, the major modelling criteria that arise are:

9 Combining morphological analysis and Bayesian networks for strategic decision support 113 Figure 5: Illustration of two inference tasks in a BN 1. What are the variables and variable values? 2. What does the graphical (e.g. causal) structure look like i.e. between which variables are there dependencies and what are their causal directions? 3. What are the strengths of these dependencies, as depicted in the graphical structure? Although these issues are listed as sequential steps in the BN modelling process, in reality the process is far from this simple. Step 1 and 2 of developing a BN require considerable effort, but is more practicable (Druzdzel & Van der Gaag, 2000). Step 3 of the process is considered the harder task and more time-consuming. Data sources available are not encoded in probabilities and many techniques exist to do that, depending on the data format. For example, the EM (Expectation-Maximisation) algorithm (Stuart & Norvig, 2003) may be used to estimate the probabilities of a BN if empirical data are available. Many knowledge engineering techniques exist to elicit and translate expert knowledge into probabilities (Druzdzel & Van der Gaag, 2000). It is often the case of strategic decision support models, which are often extremely complex, that empirical data do not exist and the structure of the causal network is not intuitive to elicit. These features tend to leave expert groups with a sense of uneasiness in how to engage in an involved modelling process. For this reason, we have found it advantageous to break up the modeling process into two conceptually distinct phases: Phase 1: Dimension the problem by identifying relevant variables and variables values. Create a linked parameter space based on internal consistency assessment between all pairs of variable values. Although these internal relationships do not explicitly indicate a hierarchical or causal structure, they nevertheless give an indication of which variables significantly influence one another. This phase should be carried out without any reference to directed causality or hierarchy, thus allowing the working group to concentrate on one main task. This task can be facilitated with morphological analysis.

10 114 A de Waal & T Ritchey Phase 2: On the basis of phase 1, create a directed, acyclic (causal) structure between the variables, and assess the strengths of the dependencies between the values of the dependent variables. This phase will result in a Bayesian network, which can be used as a what-if inference model. 4 Case study As an example, we present a relatively small, prototype inference model, developed as proof-of-concept, for the Swedish Rescue Services Agency (SRSA). The case study involved developing a decision support model for assessing the environmental impact of different fire-fighting methods under different conditions. The three pillars of rescue service operations concern protecting 1) human life, 2) property and 3) the environment usually in that order. Thus, when rescue services are called upon to deal with fires, they must make a number of decisions on what method or methods they should employ. If lives are threatened, then any and all methods will be applied in order to save lives. However, when saving lives is not at stake, rescue services are required to take into account the environmental consequences of different fire fighting methods. For instance, consider a container fire involving poisonous substances (e.g. heavy metals), located near a municipal water reserve or other ecologically sensitive area. Under such circumstances, fire fighters should avoid methods which would, for instance, result in uncontrolled spill water contaminating the environment. For this reason, the Swedish Rescue Services Agency (SRSA) commissioned FOI (the Swedish Defence Research Agency in Stockholm) to develop a prototype decision support model in order to aid rescue service personnel in choosing appropriate fire fighting methods under different circumstances. The model was primarily to be utilized for planning, education and training, but might also be employed as an operational decision support system. 4.1 Phase 1: Developing a morphological analysis model The model was developed during a series of workshops, each with the participation of 6 8 fire chiefs and fire engineers from different Swedish municipalities, and subject specialists from SRSA and FOI. The modelling process, as described in 2, was facilitated by the authors. The first step involved identifying and defining the problem area s most important variables. Seven variables were chosen for the prototype model: Situational variables (predictive inputs/diagnostic outputs): Type of event i.e. what is the context of the fire? Type of substance i.e. what is burning? Geographical situation i.e. on what surface or by what medium can substances be spread? Threatened recipient i.e. what sensitive ecological areas or objects are in proximity? Decision variables (throughput): Fire-fighting methods available to the fire fighters.

11 Combining morphological analysis and Bayesian networks for strategic decision support 115 Consequence variables (predictive outputs/diagnostic inputs): Likelihood of substance spreading to recipient, as the result of fighting the fire. Environmental consequences of substance spreading. These prototype variables and their subsequent values are shown in the morphological field below (Figure 5). Figure 6: Morphological field for the environmental impact of different fire-fighting methods, with one hypothetical case displayed. The next step is to perform a cross consistency assessment in order to determine which variables directly affect which other variables. A preliminary cross consistency assessment revealed the following: 1. The situational variables (columns 1 4 in Figure 6) were found to be largely hyper coherent, i.e. it would seem that all pair-wise value combinations are possible. Some combinations are undoubtedly more likely than others, but this is irrelevant from the point of view of what we are trying to model. We are not interested in the probability of different situations, but in the consequences of decisions made in the context of any possible situation. We therefore leave the cross consistencies between the situational variables open (i.e. everything is possible). This is seen by the empty cross consistency cells in Figure The primary constraints on the best fire-fighting methods are type of substance and type of event. 3. The primary constraints on the likelihood of spreading are fire-fighting methods and geographical situation. 4. Finally, the primary constraints on environmental consequences are type of substance, threatened recipient and likelihood of spreading. 5. All other pare-wise value combinations can be left open. A subset of these relationships are shown in Figure 7, below. The areas marked X represent the dependent variables. The areas marked S represent interesting combinations

12 116 A de Waal & T Ritchey of conditions and serves as a flagging mechanism. In morphological analysis, consistence relationships infer no causal direction, but only establish dependency. Since we had already decided to map out these directed dependencies in a Bayesian network, we did not perform the actual cross-consistency assessment on the morphological field. Figure 7: Cross-consistency matrix showing dependent variables ( X markings). 4.2 Phase 2 Developing a Bayesian network The preliminary cross consistency assessment revealed the variables which would display dependencies. The next step is to establish a causally directed structure, with multiple dependencies between certain variables. This step was undertaken with a group of fire engineers and fire chiefs during a two day workshop in Stockholm. This situation is represented by the causal network in Figure 8, which fulfils the second criterion for a Bayesian network model: What does the graphical (e.g. causal) structure look like i.e. between which variables are there dependencies and what are their causal directions? Figure 8: Causal network for the environmental impact of different fire-fighting methods. The final step in producing the Bayesian network model is to establish the strengths of the dependencies between the relevant variables. The conditional probability tables were

13 Combining morphological analysis and Bayesian networks for strategic decision support 117 populated using the expert knowledge available at the workshop. This means that the quantitative information in the BN is based on expert judgement. The next step in refining the BN is to encode the empirical data into probabilities and to use it (instead of expert knowledge) to populate the probability tables of the BN. This entails the task of estimating the probabilities from the data. Estimation methods include the maximum likehood procedure with complete data sets and the EM (Expectation- Maximisation) algorithm with incomplete data sets (Cowell et al., 1999). Figure 9 illustrates the CPTs of all the variables in the BN. Figure 9: Quantified BN for the environmental impact of different fire-fighting methods. These CPTs are the results of a completed BN with quantitative information captured in the causal diagram (Figure 8) and quantitative information captured as probabilities in the CPTs. The links between variables remain as in the causal network in Figure 8, but are omitted in Figures 9 12 to avoid visual clutter. In both morphological and BN models, anything can be designated as input, and anything as output. As stated in 3, once the BN is constructed, it may be used to estimate values of query nodes (or variables), given the values of observed variables. In Figures the states with the number represents the observed states of variables and all the other states represent the probabilistic values of those conditions given the observed states. The probabilities are normalised and multiplied by 100 so that the numbers in one CPT add up to 100. The BN was constructed in the software package Hugin R. The resulting BN model may thus be used in a number of different modes. The first and most natural mode is synthetic and predictive, i.e. given a set of circumstances and a selected fire-fighting method, what is the likelihood of substances spreading, leading to negative consequence for the environment. Figure 10 may be interpreted as follows: If Type of substance = Plastic, Type of Event = container, Geological Situation = Frozen ground, Threatened Recipient = Farmland, and

14 118 A de Waal & T Ritchey Figure 10: instance? Example of Predictive mode. What if we use Water with no control on a particular Fire-fighting Method = Water, with no control, then there is a 0.55 probability for no significant environmental consequences, 0.35 probability for short term environmental influence, 0.1 probability for long term environmental influence, and 0 probability for irreversible environmental influence. This may be seen from the CPT for the node Environmental Influence in Figure 10. The second mode is synthetic and prescriptive, i.e. given a set of circumstances, which fire-fighting methods are best for reducing substance spreading and resultant environmental damage (Figure 11). Finally, the third mode is analytic and diagnostic, i.e. given a degree of environmental impact, what are the circumstances and fire-fighting methods that can lead to this (Figure 12). The interpretation of Figure 11 and Figure 12 is left to the reader. These are only three examples. Any other combination of variables can be designated input, in order to check the output of the remaining variables, thus mixing predictive and diagnostic modes. This is especially valuable for education and training. 5 Conclusions Both MA and BNs have proven to be appropriate techniques for treating complex, strategic problem spaces. MA is a method for defining, linking and evaluating these problem spaces. However, with MA it is difficult to represent hierarchical structure and the links between variables are not causally defined. Furthermore, the MA approach is non-quantified, which means that the strength of links between variables is not (quantitatively) defined.

15 Combining morphological analysis and Bayesian networks for strategic decision support 119 Figure 11: Prescriptive mode. What is the best fire-fighting method for a particular case? Figure 12: Example of Diagnostic mode: Under what circumstances can irreversible environmental damage be done? BNs are graphical models which consist of a qualitative and quantitative part. The qualitative part is a cause-and-effect, or causal graph. The quantitative part depicts the strength of the causal relationships between variables. In terms of inference, a BN is much more descriptive, but also much more difficult to develop in the initial problem formulation phase of the modelling process. We suggest a modelling process that makes use of both of these modelling techniques in two phases: Firstly the MA approach may be used to formulate the problem and to create an internal structure. This phase contributes to a better understanding of the problem space. In some instances this knowledge and understanding is not sufficient and there is a need for addressing hierarchical and/or causal structures. We then recommend the use of BNs in phase two of the modelling process. BNs introduce a causal structure and allow for quantification of the relationships between variables. The model presented in the case study is only a proof-of-concept. It is primarily intended to test a modelling method, not the subject area itself. However, the substantive decision support model for assessing the environmental impact of different fire-fighting methods under difference conditions is now in its next stage of development at the Swedish Rescue

16 120 A de Waal & T Ritchey Services Agency. Also, a project involving decision support for phasing out military firing ranges has recently progressed from its morphological phase (Stenström & Westin, 2004) to its Bayesian phase (not yet reported in English). References [1] Borsuk ME, Stow CA & Reckhow KH, 2003, A Bayesian network of eutrophication models for synthesis, prediction, and uncertainty analysis, Ecological Modelling, 173, pp [2] Cowell RG, Dawid, AP, Lauritzen, SL & Spiegelhalter DJ, 1999, Probabilistic networks and expert systems, Springer-Verlag, New York (NY). [3] Coyle RG & McGlone GR, 1995, Projection Scenarios for South-east Asia and the South-west Pacific, Futures, 27(1), pp [4] Coyle RG & Yong YC, 1996, A scenario projection for the South China Sea, Futures, 28(3), pp [5] Doty D & Glick W, 1994, Typologies as a unique form of theory building, Academy of Management Review, 19, pp [6] Druzdzel MJ & van der Gaag LC, 2000, Building probabilistic networks: Where do the numbers come from?, IEEE Transactions on Knowledge and Data Engineering, 12(4), pp [7] Eriksson T & Ritchey T, 2002, Scenario development and force requirements using morphological analysis, Paper presented at Winchester International OR Conference, Winchester, [Online], [Cited November 12th, 2007], Available at: [8] Jensen FV, 2001, Bayesian networks and decision graphs, Springer-Verlag, New York (NY). [9] Korb KB & Nicholson AE, 2004, Bayesian artificial intelligence, Chapman & Hall/CRC, Boca Raton (FL). [10] Murphy KP, 2002, Dynamic Bayesian networks: Representation, inference and leaning, PhD dissertation, University of California, Berkeley. [11] Rhyne R, 1981, Whole-pattern futures projection, using field anomaly relaxation, Technological Forecasting and Social Change, 19, pp [12] Rhyne R, 1995a, Field anomaly relaxation The arts of usage, Futures, 27(6), pp [13] Rhyne R, 1995b, Evaluating alternative Indonesian Sea-sovereignty systems, Paper presented at Informs: Institute for Operations Research and the Management Sciences Conference, New Orleans. [14] Ritchey T, 1997, Scenario development and risk management using morphological field analysis, Proceedings of the 5th European Conference on Information Systems (Cork: Cork Publishing Company) 3, pp , [Online], [Cited November 12th, 2007], Available at: [15] Ritchey T, 1998, Fritz Zwicky, Morphologie and policy analysis, Paper presented at the 16th Euro Conference on Operational Analysis, Brussels. [16] Ritchey T, 2002, Modelling complex socio-technical systems using morphological analysis, Adapted from an address to the Swedish Parliamentary IT Commission, Stockholm, December 2002, [Online], [Cited November 12th, 2007], Available at:

17 Combining morphological analysis and Bayesian networks for strategic decision support 121 [17] Ritchey T, 2003, Nuclear facilities and sabotage: Using morphological analysis as a scenario and strategy development laboratory, Adapted from astudy for the Swedish Nuclear Power Inspectorate, and presented to the 44th Annual Meeting of the Institute of Nuclear Materials Management, Phoenix, Arizona, [Online], [Cited November 12th 2007], Available at: [18] Ritchey T & Stenström M, 2002, Using morphological analysis to evaluate preparedness for accidents involving hazardous materials, Study for the Swedish Rescue Services Board, presented at the 4th International Conference for Local Authorities, Shanghai, [Online], [Cited November 12th, 2007], Available at: [19] Stenström M & Westrin P, 2004, Living with UXO Using morphological analysis for decision support in phasing out military firing ranges, Summary of Report to the Swedish Armed Forces UXO Program, Stockholm, [Online], [Cited November 12th, 2007], Available at: [20] Stuart R & Norvig P, 2003, Artificial intelligence A modern approach, Pearson Education Inc., Englewood Cliffs (NJ). [21] Zwicky F, 1969, Discovery, invention, research Through the morphological approach, The Macmillian Company, Toronto. [22] Zwicky F & Wilson A (Eds.), 1967, New methods of thought and procedure: Contributions to the symposium on methodologies, Springer, Berlin, [Online], [Cited November 12th, 2007], Available at:

18 122

Logistic Regression and Bayesian Approaches in Modeling Acceptance of Male Circumcision in Pune, India

Logistic Regression and Bayesian Approaches in Modeling Acceptance of Male Circumcision in Pune, India 20th International Congress on Modelling and Simulation, Adelaide, Australia, 1 6 December 2013 www.mssanz.org.au/modsim2013 Logistic Regression and Bayesian Approaches in Modeling Acceptance of Male Circumcision

More information

Supplementary notes for lecture 8: Computational modeling of cognitive development

Supplementary notes for lecture 8: Computational modeling of cognitive development Supplementary notes for lecture 8: Computational modeling of cognitive development Slide 1 Why computational modeling is important for studying cognitive development. Let s think about how to study the

More information

BAYESIAN NETWORK FOR FAULT DIAGNOSIS

BAYESIAN NETWORK FOR FAULT DIAGNOSIS BAYESIAN NETWOK FO FAULT DIAGNOSIS C.H. Lo, Y.K. Wong and A.B. ad Department of Electrical Engineering, The Hong Kong Polytechnic University Hung Hom, Kowloon, Hong Kong Fax: +852 2330 544 Email: eechlo@inet.polyu.edu.hk,

More information

International Journal of Software and Web Sciences (IJSWS)

International Journal of Software and Web Sciences (IJSWS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Lecture 3: Bayesian Networks 1

Lecture 3: Bayesian Networks 1 Lecture 3: Bayesian Networks 1 Jingpeng Li 1 Content Reminder from previous lecture: Bayes theorem Bayesian networks Why are they currently interesting? Detailed example from medical diagnostics Bayesian

More information

The 29th Fuzzy System Symposium (Osaka, September 9-, 3) Color Feature Maps (BY, RG) Color Saliency Map Input Image (I) Linear Filtering and Gaussian

The 29th Fuzzy System Symposium (Osaka, September 9-, 3) Color Feature Maps (BY, RG) Color Saliency Map Input Image (I) Linear Filtering and Gaussian The 29th Fuzzy System Symposium (Osaka, September 9-, 3) A Fuzzy Inference Method Based on Saliency Map for Prediction Mao Wang, Yoichiro Maeda 2, Yasutake Takahashi Graduate School of Engineering, University

More information

How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis?

How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis? How Does Analysis of Competing Hypotheses (ACH) Improve Intelligence Analysis? Richards J. Heuer, Jr. Version 1.2, October 16, 2005 This document is from a collection of works by Richards J. Heuer, Jr.

More information

INTERVIEWS II: THEORIES AND TECHNIQUES 5. CLINICAL APPROACH TO INTERVIEWING PART 1

INTERVIEWS II: THEORIES AND TECHNIQUES 5. CLINICAL APPROACH TO INTERVIEWING PART 1 INTERVIEWS II: THEORIES AND TECHNIQUES 5. CLINICAL APPROACH TO INTERVIEWING PART 1 5.1 Clinical Interviews: Background Information The clinical interview is a technique pioneered by Jean Piaget, in 1975,

More information

Application of Bayesian Networks to Quantitative Assessment of Safety Barriers Performance in the Prevention of Major Accidents

Application of Bayesian Networks to Quantitative Assessment of Safety Barriers Performance in the Prevention of Major Accidents 151 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 53, 2016 Guest Editors: Valerio Cozzani, Eddy De Rademaeker, Davide Manca Copyright 2016, AIDIC Servizi S.r.l., ISBN 978-88-95608-44-0; ISSN

More information

IE 5203 Decision Analysis Lab I Probabilistic Modeling, Inference and Decision Making with Netica

IE 5203 Decision Analysis Lab I Probabilistic Modeling, Inference and Decision Making with Netica IE 5203 Decision Analysis Lab I Probabilistic Modeling, Inference and Decision Making with Netica Overview of Netica Software Netica Application is a comprehensive tool for working with Bayesian networks

More information

APPROVAL SHEET. Uncertainty in Semantic Web. Doctor of Philosophy, 2005

APPROVAL SHEET. Uncertainty in Semantic Web. Doctor of Philosophy, 2005 APPROVAL SHEET Title of Dissertation: BayesOWL: A Probabilistic Framework for Uncertainty in Semantic Web Name of Candidate: Zhongli Ding Doctor of Philosophy, 2005 Dissertation and Abstract Approved:

More information

Decisions and Dependence in Influence Diagrams

Decisions and Dependence in Influence Diagrams JMLR: Workshop and Conference Proceedings vol 52, 462-473, 2016 PGM 2016 Decisions and Dependence in Influence Diagrams Ross D. hachter Department of Management cience and Engineering tanford University

More information

Answers to end of chapter questions

Answers to end of chapter questions Answers to end of chapter questions Chapter 1 What are the three most important characteristics of QCA as a method of data analysis? QCA is (1) systematic, (2) flexible, and (3) it reduces data. What are

More information

Causal Knowledge Modeling for Traditional Chinese Medicine using OWL 2

Causal Knowledge Modeling for Traditional Chinese Medicine using OWL 2 Causal Knowledge Modeling for Traditional Chinese Medicine using OWL 2 Peiqin Gu College of Computer Science, Zhejiang University, P.R.China gupeiqin@zju.edu.cn Abstract. Unlike Western Medicine, those

More information

Expert judgements in risk and reliability analysis

Expert judgements in risk and reliability analysis Expert judgements in risk and reliability analysis Jan-Erik Holmberg M2-E2117 Risk analysis, April 17, 2016 Aalto university Contents Definitions Applications Bayesian approach Examples 2 Background Objective,

More information

Handling Partial Preferences in the Belief AHP Method: Application to Life Cycle Assessment

Handling Partial Preferences in the Belief AHP Method: Application to Life Cycle Assessment Handling Partial Preferences in the Belief AHP Method: Application to Life Cycle Assessment Amel Ennaceur 1, Zied Elouedi 1, and Eric Lefevre 2 1 University of Tunis, Institut Supérieur de Gestion de Tunis,

More information

Goal-Oriented Measurement plus System Dynamics A Hybrid and Evolutionary Approach

Goal-Oriented Measurement plus System Dynamics A Hybrid and Evolutionary Approach Goal-Oriented Measurement plus System Dynamics A Hybrid and Evolutionary Approach Dietmar Pfahl Fraunhofer Institute IESE pfahl@iese.fhg.de Günther Ruhe University of Calgary ruhe@ucalgary.ca 1. Aim and

More information

Learning Deterministic Causal Networks from Observational Data

Learning Deterministic Causal Networks from Observational Data Carnegie Mellon University Research Showcase @ CMU Department of Psychology Dietrich College of Humanities and Social Sciences 8-22 Learning Deterministic Causal Networks from Observational Data Ben Deverett

More information

Application of Bayesian Network Model for Enterprise Risk Management of Expressway Management Corporation

Application of Bayesian Network Model for Enterprise Risk Management of Expressway Management Corporation 2011 International Conference on Innovation, Management and Service IPEDR vol.14(2011) (2011) IACSIT Press, Singapore Application of Bayesian Network Model for Enterprise Risk Management of Expressway

More information

Citation for published version (APA): Geus, A. F. D., & Rotterdam, E. P. (1992). Decision support in aneastehesia s.n.

Citation for published version (APA): Geus, A. F. D., & Rotterdam, E. P. (1992). Decision support in aneastehesia s.n. University of Groningen Decision support in aneastehesia Geus, Arian Fred de; Rotterdam, Ernest Peter IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to

More information

Outline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper?

Outline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper? Outline A Critique of Software Defect Prediction Models Norman E. Fenton Dongfeng Zhu What s inside this paper? What kind of new technique was developed in this paper? Research area of this technique?

More information

Improving Construction of Conditional Probability Tables for Ranked Nodes in Bayesian Networks Pekka Laitila, Kai Virtanen

Improving Construction of Conditional Probability Tables for Ranked Nodes in Bayesian Networks Pekka Laitila, Kai Virtanen Improving Construction of Conditional Probability Tables for Ranked Nodes in Bayesian Networks Pekka Laitila, Kai Virtanen pekka.laitila@aalto.fi, kai.virtanen@aalto.fi Systems Analysis Laboratory, Department

More information

Analysis of complex patterns of evidence in legal cases: Wigmore charts vs. Bayesian networks

Analysis of complex patterns of evidence in legal cases: Wigmore charts vs. Bayesian networks Analysis of complex patterns of evidence in legal cases: Wigmore charts vs. Bayesian networks V. Leucari October 2005 Typical features of the evidence arising from legal cases are its complex structure

More information

TEACHING YOUNG GROWNUPS HOW TO USE BAYESIAN NETWORKS.

TEACHING YOUNG GROWNUPS HOW TO USE BAYESIAN NETWORKS. TEACHING YOUNG GROWNUPS HOW TO USE BAYESIAN NETWORKS Stefan Krauss 1, Georg Bruckmaier 1 and Laura Martignon 2 1 Institute of Mathematics and Mathematics Education, University of Regensburg, Germany 2

More information

P(HYP)=h. P(CON HYP)=p REL. P(CON HYP)=q REP

P(HYP)=h. P(CON HYP)=p REL. P(CON HYP)=q REP BAYESIAN NETWORKS IN PHILOSOPHY STEPHAN HARTMANN, LUC BOVENS 1. Introduction There is a long philosophical tradition of addressing questions in philosophy of science and epistemology by means of the tools

More information

CISC453 Winter Probabilistic Reasoning Part B: AIMA3e Ch

CISC453 Winter Probabilistic Reasoning Part B: AIMA3e Ch CISC453 Winter 2010 Probabilistic Reasoning Part B: AIMA3e Ch 14.5-14.8 Overview 2 a roundup of approaches from AIMA3e 14.5-14.8 14.5 a survey of approximate methods alternatives to the direct computing

More information

ERA: Architectures for Inference

ERA: Architectures for Inference ERA: Architectures for Inference Dan Hammerstrom Electrical And Computer Engineering 7/28/09 1 Intelligent Computing In spite of the transistor bounty of Moore s law, there is a large class of problems

More information

A probabilistic method for food web modeling

A probabilistic method for food web modeling A probabilistic method for food web modeling Bayesian Networks methodology, challenges, and possibilities Anna Åkesson, Linköping University, Sweden 2 nd international symposium on Ecological Networks,

More information

A Brief Introduction to Bayesian Statistics

A Brief Introduction to Bayesian Statistics A Brief Introduction to Statistics David Kaplan Department of Educational Psychology Methods for Social Policy Research and, Washington, DC 2017 1 / 37 The Reverend Thomas Bayes, 1701 1761 2 / 37 Pierre-Simon

More information

A Comparison of Collaborative Filtering Methods for Medication Reconciliation

A Comparison of Collaborative Filtering Methods for Medication Reconciliation A Comparison of Collaborative Filtering Methods for Medication Reconciliation Huanian Zheng, Rema Padman, Daniel B. Neill The H. John Heinz III College, Carnegie Mellon University, Pittsburgh, PA, 15213,

More information

A Bayesian Network Analysis of Eyewitness Reliability: Part 1

A Bayesian Network Analysis of Eyewitness Reliability: Part 1 A Bayesian Network Analysis of Eyewitness Reliability: Part 1 Jack K. Horner PO Box 266 Los Alamos NM 87544 jhorner@cybermesa.com ICAI 2014 Abstract In practice, many things can affect the verdict in a

More information

Exploring the Influence of Particle Filter Parameters on Order Effects in Causal Learning

Exploring the Influence of Particle Filter Parameters on Order Effects in Causal Learning Exploring the Influence of Particle Filter Parameters on Order Effects in Causal Learning Joshua T. Abbott (joshua.abbott@berkeley.edu) Thomas L. Griffiths (tom griffiths@berkeley.edu) Department of Psychology,

More information

MBios 478: Systems Biology and Bayesian Networks, 27 [Dr. Wyrick] Slide #1. Lecture 27: Systems Biology and Bayesian Networks

MBios 478: Systems Biology and Bayesian Networks, 27 [Dr. Wyrick] Slide #1. Lecture 27: Systems Biology and Bayesian Networks MBios 478: Systems Biology and Bayesian Networks, 27 [Dr. Wyrick] Slide #1 Lecture 27: Systems Biology and Bayesian Networks Systems Biology and Regulatory Networks o Definitions o Network motifs o Examples

More information

Bayesian Networks in Medicine: a Model-based Approach to Medical Decision Making

Bayesian Networks in Medicine: a Model-based Approach to Medical Decision Making Bayesian Networks in Medicine: a Model-based Approach to Medical Decision Making Peter Lucas Department of Computing Science University of Aberdeen Scotland, UK plucas@csd.abdn.ac.uk Abstract Bayesian

More information

The Development and Application of Bayesian Networks Used in Data Mining Under Big Data

The Development and Application of Bayesian Networks Used in Data Mining Under Big Data 2017 International Conference on Arts and Design, Education and Social Sciences (ADESS 2017) ISBN: 978-1-60595-511-7 The Development and Application of Bayesian Networks Used in Data Mining Under Big Data

More information

Bayesian (Belief) Network Models,

Bayesian (Belief) Network Models, Bayesian (Belief) Network Models, 2/10/03 & 2/12/03 Outline of This Lecture 1. Overview of the model 2. Bayes Probability and Rules of Inference Conditional Probabilities Priors and posteriors Joint distributions

More information

Marriage Matching with Correlated Preferences

Marriage Matching with Correlated Preferences Marriage Matching with Correlated Preferences Onur B. Celik Department of Economics University of Connecticut and Vicki Knoblauch Department of Economics University of Connecticut Abstract Authors of experimental,

More information

Using Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s

Using Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s Using Bayesian Networks to Analyze Expression Data Xu Siwei, s0789023 Muhammad Ali Faisal, s0677834 Tejal Joshi, s0677858 Outline Introduction Bayesian Networks Equivalence Classes Applying to Expression

More information

Representation and Analysis of Medical Decision Problems with Influence. Diagrams

Representation and Analysis of Medical Decision Problems with Influence. Diagrams Representation and Analysis of Medical Decision Problems with Influence Diagrams Douglas K. Owens, M.D., M.Sc., VA Palo Alto Health Care System, Palo Alto, California, Section on Medical Informatics, Department

More information

Dynamic Rule-based Agent

Dynamic Rule-based Agent International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 11, Number 4 (2018), pp. 605-613 International Research Publication House http://www.irphouse.com Dynamic Rule-based

More information

A Matrix of Material Representation

A Matrix of Material Representation A Matrix of Material Representation Hengfeng Zuo a, Mark Jones b, Tony Hope a, a Design and Advanced Technology Research Centre, Southampton Institute, UK b Product Design Group, Faculty of Technology,

More information

5/20/2014. Leaving Andy Clark's safe shores: Scaling Predictive Processing to higher cognition. ANC sysmposium 19 May 2014

5/20/2014. Leaving Andy Clark's safe shores: Scaling Predictive Processing to higher cognition. ANC sysmposium 19 May 2014 ANC sysmposium 19 May 2014 Lorentz workshop on HPI Leaving Andy Clark's safe shores: Scaling Predictive Processing to higher cognition Johan Kwisthout, Maria Otworowska, Harold Bekkering, Iris van Rooij

More information

BACKGROUND + GENERAL COMMENTS

BACKGROUND + GENERAL COMMENTS Response on behalf of Sobi (Swedish Orphan Biovitrum AB) to the European Commission s Public Consultation on a Commission Notice on the Application of Articles 3, 5 and 7 of Regulation (EC) No. 141/2000

More information

How to Create Better Performing Bayesian Networks: A Heuristic Approach for Variable Selection

How to Create Better Performing Bayesian Networks: A Heuristic Approach for Variable Selection How to Create Better Performing Bayesian Networks: A Heuristic Approach for Variable Selection Esma Nur Cinicioglu * and Gülseren Büyükuğur Istanbul University, School of Business, Quantitative Methods

More information

The Regression-Discontinuity Design

The Regression-Discontinuity Design Page 1 of 10 Home» Design» Quasi-Experimental Design» The Regression-Discontinuity Design The regression-discontinuity design. What a terrible name! In everyday language both parts of the term have connotations

More information

Connectivity in a Bipolar Fuzzy Graph and its Complement

Connectivity in a Bipolar Fuzzy Graph and its Complement Annals of Pure and Applied Mathematics Vol. 15, No. 1, 2017, 89-95 ISSN: 2279-087X (P), 2279-0888(online) Published on 11 December 2017 www.researchmathsci.org DOI: http://dx.doi.org/10.22457/apam.v15n1a8

More information

AALBORG UNIVERSITY. Prediction of the Insulin Sensitivity Index using Bayesian Network. Susanne G. Bøttcher and Claus Dethlefsen

AALBORG UNIVERSITY. Prediction of the Insulin Sensitivity Index using Bayesian Network. Susanne G. Bøttcher and Claus Dethlefsen AALBORG UNIVERSITY Prediction of the Insulin Sensitivity Index using Bayesian Network by Susanne G. Bøttcher and Claus Dethlefsen May 2004 R-2004-14 Department of Mathematical Sciences Aalborg University

More information

INTRODUCTION TO ECONOMETRICS (EC212)

INTRODUCTION TO ECONOMETRICS (EC212) INTRODUCTION TO ECONOMETRICS (EC212) Course duration: 54 hours lecture and class time (Over three weeks) LSE Teaching Department: Department of Economics Lead Faculty (session two): Dr Taisuke Otsu and

More information

A Bayesian Network Model of Knowledge-Based Authentication

A Bayesian Network Model of Knowledge-Based Authentication Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 A Bayesian Network Model of Knowledge-Based Authentication

More information

Support system for breast cancer treatment

Support system for breast cancer treatment Support system for breast cancer treatment SNEZANA ADZEMOVIC Civil Hospital of Cacak, Cara Lazara bb, 32000 Cacak, SERBIA Abstract:-The aim of this paper is to seek out optimal relation between diagnostic

More information

An Evolutionary Approach to Tower of Hanoi Problem

An Evolutionary Approach to Tower of Hanoi Problem An Evolutionary Approach to Tower of Hanoi Problem Jie Li, Rui Shen Department of Computer Engineering Shandong Aerospace Electro-Technology Institute Yantai, China jie_yi_ehw@163.com Abstract:The Tower

More information

Cognitive Maps-Based Student Model

Cognitive Maps-Based Student Model Cognitive Maps-Based Student Model Alejandro Peña 1,2,3, Humberto Sossa 3, Agustín Gutiérrez 3 WOLNM 1, UPIICSA 2 & CIC 3 - National Polytechnic Institute 2,3, Mexico 31 Julio 1859, # 1099-B, Leyes Reforma,

More information

Bayesian Belief Network Based Fault Diagnosis in Automotive Electronic Systems

Bayesian Belief Network Based Fault Diagnosis in Automotive Electronic Systems Bayesian Belief Network Based Fault Diagnosis in Automotive Electronic Systems Yingping Huang *, David Antory, R. Peter Jones, Craig Groom, Ross McMurran, Peter Earp and Francis Mckinney International

More information

Choose an approach for your research problem

Choose an approach for your research problem Choose an approach for your research problem This course is about doing empirical research with experiments, so your general approach to research has already been chosen by your professor. It s important

More information

You can use this app to build a causal Bayesian network and experiment with inferences. We hope you ll find it interesting and helpful.

You can use this app to build a causal Bayesian network and experiment with inferences. We hope you ll find it interesting and helpful. icausalbayes USER MANUAL INTRODUCTION You can use this app to build a causal Bayesian network and experiment with inferences. We hope you ll find it interesting and helpful. We expect most of our users

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1 Motivation and Goals The increasing availability and decreasing cost of high-throughput (HT) technologies coupled with the availability of computational tools and data form a

More information

Modeling State Space Search Technique for a Real World Adversarial Problem Solving

Modeling State Space Search Technique for a Real World Adversarial Problem Solving Modeling State Space Search Technique for a Real World Adversarial Problem Solving Kester O. OMOREGIE Computer Science Department, Auchi Polytechnic, Auchi, NIGERIA Stella C. CHIEMEKE Computer Science

More information

Automatic Definition of Planning Target Volume in Computer-Assisted Radiotherapy

Automatic Definition of Planning Target Volume in Computer-Assisted Radiotherapy Automatic Definition of Planning Target Volume in Computer-Assisted Radiotherapy Angelo Zizzari Department of Cybernetics, School of Systems Engineering The University of Reading, Whiteknights, PO Box

More information

The Common Priors Assumption: A comment on Bargaining and the Nature of War

The Common Priors Assumption: A comment on Bargaining and the Nature of War The Common Priors Assumption: A comment on Bargaining and the Nature of War Mark Fey Kristopher W. Ramsay June 10, 2005 Abstract In a recent article in the JCR, Smith and Stam (2004) call into question

More information

Received 23 September 2007; Accepted 26 September case control study; causal inference; Bayesian network; epidemiology

Received 23 September 2007; Accepted 26 September case control study; causal inference; Bayesian network; epidemiology QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL Qual. Reliab. Engng. Int. 2008; 24:291 302 Published online 6 November 2007 in Wiley InterScience (www.interscience.wiley.com)..893 Research Modeling and

More information

An Interactive Modeling Environment for Systems Biology of Aging

An Interactive Modeling Environment for Systems Biology of Aging An Interactive Modeling Environment for Systems Biology of Aging Pat Langley Computer Science and Engineering Arizona State University Tempe, Arizona Thanks to D. Bidaye, J. Difzac, J. Furber, S. Kim,

More information

METHODOLOGY FOR DISSERTATION

METHODOLOGY FOR DISSERTATION METHODOLOGY FOR DISSERTATION In order to expose the methods of scientific work, it is necessary to briefly clarify the terms of methodology, methods and scientific methods. The methodology comes from the

More information

Structural assessment of heritage buildings

Structural assessment of heritage buildings Defence Sites 69 Structural assessment of heritage buildings M. Holicky & M. Sykora Klokner Institute, Czech Technical University in Prague, Czech Republic Abstract Reliability assessment of heritage buildings

More information

MISSING DATA AND PARAMETERS ESTIMATES IN MULTIDIMENSIONAL ITEM RESPONSE MODELS. Federico Andreis, Pier Alda Ferrari *

MISSING DATA AND PARAMETERS ESTIMATES IN MULTIDIMENSIONAL ITEM RESPONSE MODELS. Federico Andreis, Pier Alda Ferrari * Electronic Journal of Applied Statistical Analysis EJASA (2012), Electron. J. App. Stat. Anal., Vol. 5, Issue 3, 431 437 e-issn 2070-5948, DOI 10.1285/i20705948v5n3p431 2012 Università del Salento http://siba-ese.unile.it/index.php/ejasa/index

More information

in Engineering Prof. Dr. Michael Havbro Faber ETH Zurich, Switzerland Swiss Federal Institute of Technology

in Engineering Prof. Dr. Michael Havbro Faber ETH Zurich, Switzerland Swiss Federal Institute of Technology Risk and Safety in Engineering Prof. Dr. Michael Havbro Faber ETH Zurich, Switzerland Contents of Today's Lecture Introduction to Bayesian Probabilistic Nets (BPN) Causality as a support in reasoning Basic

More information

Plan Recognition through Goal Graph Analysis

Plan Recognition through Goal Graph Analysis Plan Recognition through Goal Graph Analysis Jun Hong 1 Abstract. We present a novel approach to plan recognition based on a two-stage paradigm of graph construction and analysis. First, a graph structure

More information

School of Nursing, University of British Columbia Vancouver, British Columbia, Canada

School of Nursing, University of British Columbia Vancouver, British Columbia, Canada Data analysis in qualitative research School of Nursing, University of British Columbia Vancouver, British Columbia, Canada Unquestionably, data analysis is the most complex and mysterious of all of the

More information

Indiana Academic Standards Addressed By Zoo Program WINGED WONDERS: SEED DROP!

Indiana Academic Standards Addressed By Zoo Program WINGED WONDERS: SEED DROP! Indiana Academic Standards Addressed By Zoo Program WINGED WONDERS: SEED DROP! Program description: Discover how whether all seeds fall at the same rate. Do small or big seeds fall more slowly? Students

More information

A Taxonomy of Decision Models in Decision Analysis

A Taxonomy of Decision Models in Decision Analysis This section is cortesy of Prof. Carlos Bana e Costa Bayesian Nets lecture in the Decision Analysis in Practice Course at the LSE and of Prof. Alec Morton in the Bayes Nets and Influence Diagrams in the

More information

Ideas RESEARCH. Theory, Design Practice. Turning INTO. Barbara Fawcett. Rosalie Pockett

Ideas RESEARCH. Theory, Design Practice. Turning INTO. Barbara Fawcett. Rosalie Pockett Turning Ideas INTO RESEARCH & Theory, Design Practice Barbara Fawcett Rosalie Pockett 00_Fawcett_BAB1410B0218_Prelims.indd 3 3/23/2015 6:32:36 PM ONE Why do research? In this chapter we look at the many

More information

Exploring Experiential Learning: Simulations and Experiential Exercises, Volume 5, 1978 THE USE OF PROGRAM BAYAUD IN THE TEACHING OF AUDIT SAMPLING

Exploring Experiential Learning: Simulations and Experiential Exercises, Volume 5, 1978 THE USE OF PROGRAM BAYAUD IN THE TEACHING OF AUDIT SAMPLING THE USE OF PROGRAM BAYAUD IN THE TEACHING OF AUDIT SAMPLING James W. Gentry, Kansas State University Mary H. Bonczkowski, Kansas State University Charles W. Caldwell, Kansas State University INTRODUCTION

More information

Temporal Primitives, an Alternative to Allen Operators

Temporal Primitives, an Alternative to Allen Operators Temporal Primitives, an Alternative to Allen Operators Manos Papadakis and Martin Doerr Foundation for Research and Technology - Hellas (FORTH) Institute of Computer Science N. Plastira 100, Vassilika

More information

A Quantitative Model of Counterfactual Reasoning

A Quantitative Model of Counterfactual Reasoning A Quantitative Model of Counterfactual Reasoning Daniel Yarlett Division of Informatics University of Edinburgh Edinburgh, Scotland dany@cogsci.ed.ac.uk Michael Ramscar Division of Informatics University

More information

Response to the ASA s statement on p-values: context, process, and purpose

Response to the ASA s statement on p-values: context, process, and purpose Response to the ASA s statement on p-values: context, process, purpose Edward L. Ionides Alexer Giessing Yaacov Ritov Scott E. Page Departments of Complex Systems, Political Science Economics, University

More information

Funnelling Used to describe a process of narrowing down of focus within a literature review. So, the writer begins with a broad discussion providing b

Funnelling Used to describe a process of narrowing down of focus within a literature review. So, the writer begins with a broad discussion providing b Accidental sampling A lesser-used term for convenience sampling. Action research An approach that challenges the traditional conception of the researcher as separate from the real world. It is associated

More information

A Bayesian Network Model for Analysis of the Factors Affecting Crime Risk

A Bayesian Network Model for Analysis of the Factors Affecting Crime Risk A Bayesian Network Model for Analysis of the Factors Affecting Crime Risk ROONGRASAMEE BOONDAO, VATCHARAPORN ESICHAIKUL and NITIN KUMAR TRIPATHI School of Advanced Technologies Asian Institute of Technology

More information

Bayesian Bi-Cluster Change-Point Model for Exploring Functional Brain Dynamics

Bayesian Bi-Cluster Change-Point Model for Exploring Functional Brain Dynamics Int'l Conf. Bioinformatics and Computational Biology BIOCOMP'18 85 Bayesian Bi-Cluster Change-Point Model for Exploring Functional Brain Dynamics Bing Liu 1*, Xuan Guo 2, and Jing Zhang 1** 1 Department

More information

Journal of Advanced Scientific Research ROUGH SET APPROACH FOR FEATURE SELECTION AND GENERATION OF CLASSIFICATION RULES OF HYPOTHYROID DATA

Journal of Advanced Scientific Research ROUGH SET APPROACH FOR FEATURE SELECTION AND GENERATION OF CLASSIFICATION RULES OF HYPOTHYROID DATA Kavitha et al., J Adv Sci Res, 2016, 7(2): 15-19 15 Journal of Advanced Scientific Research Available online through http://www.sciensage.info/jasr ISSN 0976-9595 Research Article ROUGH SET APPROACH FOR

More information

Evolutionary Approach to Investigations of Cognitive Systems

Evolutionary Approach to Investigations of Cognitive Systems Evolutionary Approach to Investigations of Cognitive Systems Vladimir RED KO a,1 b and Anton KOVAL a Scientific Research Institute for System Analysis, Russian Academy of Science, Russia b National Nuclear

More information

What Causes war? C h. 1 : T e r m i n o l o g y & Methodology. Notes by Denis Bašić

What Causes war? C h. 1 : T e r m i n o l o g y & Methodology. Notes by Denis Bašić What Causes war? C h. 1 : T e r m i n o l o g y & Methodology Notes by Denis Bašić What is called wisdom is concerned with primary causes. Aristotle The Scientific Method: Theory Theories in the social

More information

Type and quantity of data needed for an early estimate of transmissibility when an infectious disease emerges

Type and quantity of data needed for an early estimate of transmissibility when an infectious disease emerges Research articles Type and quantity of data needed for an early estimate of transmissibility when an infectious disease emerges N G Becker (Niels.Becker@anu.edu.au) 1, D Wang 1, M Clements 1 1. National

More information

Using Bayesian Networks to Direct Stochastic Search in Inductive Logic Programming

Using Bayesian Networks to Direct Stochastic Search in Inductive Logic Programming Appears in Proceedings of the 17th International Conference on Inductive Logic Programming (ILP). Corvallis, Oregon, USA. June, 2007. Using Bayesian Networks to Direct Stochastic Search in Inductive Logic

More information

On Trust. Massimo Felici. Massimo Felici On Trust c

On Trust. Massimo Felici. Massimo Felici On Trust c On Trust Massimo Felici Outline 1 What is Trust? Trust matters Trust problems Seeking an Experimental Trust Framework Trust and Dependability Directions for future work What is Trust? 2 Constructive Trust

More information

Relational methodology

Relational methodology Relational methodology Ulisse Di Corpo and Antonella Vannini 1 The discovery of attractors has widened science to the study of phenomena which cannot be caused, phenomena which we can observe, but not

More information

Chapter 2. Knowledge Representation: Reasoning, Issues, and Acquisition. Teaching Notes

Chapter 2. Knowledge Representation: Reasoning, Issues, and Acquisition. Teaching Notes Chapter 2 Knowledge Representation: Reasoning, Issues, and Acquisition Teaching Notes This chapter explains how knowledge is represented in artificial intelligence. The topic may be launched by introducing

More information

A HMM-based Pre-training Approach for Sequential Data

A HMM-based Pre-training Approach for Sequential Data A HMM-based Pre-training Approach for Sequential Data Luca Pasa 1, Alberto Testolin 2, Alessandro Sperduti 1 1- Department of Mathematics 2- Department of Developmental Psychology and Socialisation University

More information

Supplement 2. Use of Directed Acyclic Graphs (DAGs)

Supplement 2. Use of Directed Acyclic Graphs (DAGs) Supplement 2. Use of Directed Acyclic Graphs (DAGs) Abstract This supplement describes how counterfactual theory is used to define causal effects and the conditions in which observed data can be used to

More information

Rethinking Cognitive Architecture!

Rethinking Cognitive Architecture! Rethinking Cognitive Architecture! Reconciling Uniformity and Diversity via Graphical Models! Paul Rosenbloom!!! 1/25/2010! Department of Computer Science &! Institute for Creative Technologies! The projects

More information

Event Classification and Relationship Labeling in Affiliation Networks

Event Classification and Relationship Labeling in Affiliation Networks Event Classification and Relationship Labeling in Affiliation Networks Abstract Many domains are best described as an affiliation network in which there are entities such as actors, events and organizations

More information

Modelling Experimental Interventions: Results and Challenges

Modelling Experimental Interventions: Results and Challenges Concrete Causation Munich 2010 Modelling Experimental Interventions: Results and Challenges Jan-Willem Romeijn Faculty of Philosophy University of Groningen Contents 1 Overview 3 2 Interventions and confirmation

More information

Bayesian Confidence Intervals for Means and Variances of Lognormal and Bivariate Lognormal Distributions

Bayesian Confidence Intervals for Means and Variances of Lognormal and Bivariate Lognormal Distributions Bayesian Confidence Intervals for Means and Variances of Lognormal and Bivariate Lognormal Distributions J. Harvey a,b, & A.J. van der Merwe b a Centre for Statistical Consultation Department of Statistics

More information

Hostage Survival Probability Model

Hostage Survival Probability Model Hostage Survival Probability Model The Justice Academy (justiceacademy.org) and the National Tactical Officers Association (ntoa.org) have joined forces to coordinate and conduct a national study regarding

More information

Probability-Utility Model for Managing Evidence-based Central Database

Probability-Utility Model for Managing Evidence-based Central Database The Open Dentistry Journal, 2010, 4, 61-66 61 Open Access Probability-Utility Model for Managing Evidence-based Central Database Janet G. Bauer* UCLA School of Dentistry, Division of Restorative Dentistry,

More information

Stepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework

Stepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework Stepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework Thomas E. Rothenfluh 1, Karl Bögl 2, and Klaus-Peter Adlassnig 2 1 Department of Psychology University of Zurich, Zürichbergstraße

More information

Machine Learning-based Inference Analysis for Customer Preference on E-Service Features. Zi Lui, Zui Zhang:, Chenggang Bai-', Guangquan Zhang:

Machine Learning-based Inference Analysis for Customer Preference on E-Service Features. Zi Lui, Zui Zhang:, Chenggang Bai-', Guangquan Zhang: 61 Machine Learning-based Inference Analysis for Customer Preference on E-Service Features Zi Lui, Zui Zhang:, Chenggang Bai-', Guangquan Zhang: I Faculty of Resources and Environment Sciences, Hebei Normal

More information

DECISION ANALYSIS WITH BAYESIAN NETWORKS

DECISION ANALYSIS WITH BAYESIAN NETWORKS RISK ASSESSMENT AND DECISION ANALYSIS WITH BAYESIAN NETWORKS NORMAN FENTON MARTIN NEIL CRC Press Taylor & Francis Croup Boca Raton London NewYork CRC Press is an imprint of the Taylor Si Francis an Croup,

More information

STIN2103. Knowledge. engineering expert systems. Wan Hussain Wan Ishak. SOC 2079 Ext.: Url:

STIN2103. Knowledge. engineering expert systems. Wan Hussain Wan Ishak. SOC 2079 Ext.: Url: & Knowledge STIN2103 engineering expert systems Wan Hussain Wan Ishak SOC 2079 Ext.: 4786 Email: hussain@uum.edu.my Url: http://www.wanhussain.com Outline Knowledge Representation Types of knowledge Knowledge

More information

Speaker Notes: Qualitative Comparative Analysis (QCA) in Implementation Studies

Speaker Notes: Qualitative Comparative Analysis (QCA) in Implementation Studies Speaker Notes: Qualitative Comparative Analysis (QCA) in Implementation Studies PART 1: OVERVIEW Slide 1: Overview Welcome to Qualitative Comparative Analysis in Implementation Studies. This narrated powerpoint

More information

A Computational Theory of Belief Introspection

A Computational Theory of Belief Introspection A Computational Theory of Belief Introspection Kurt Konolige Artificial Intelligence Center SRI International Menlo Park, California 94025 Abstract Introspection is a general term covering the ability

More information